This page was generated automatically from The Delphi Super Page archive. If you have any remarks concerning this page please do not hesitate to mail me. In your mail please do refer to your unique DSP author ID which is 0002596. This helps me to locate your data records in DSP databse. |
Author/SiteName(Contact) | Home Page | |
TSM Inc. (TSM Inc.) | [email] | [Home] |
Files |
[ sha_nreg.zip ] [ 23,969 bytes ] | [ Freeware ] [ No Source ] [ D2 | D3 | D4 | C3 ] | ||
TSHA produces cryptographically secure hasheswhich comply with the FIPS PUB 180-1 standard.Hashes can be used to securely store passwords,sign files or text, or produce checksums. Changingeven one bit of the input changes the hashentirely in a way th Source upon Purchase/Registration Added: 23-12-1997/29-11-1998 | Version: 1.11a | Downloads: 46/46/0
|
[ slpknreg.zip ] [ 2,161,943 bytes ] | [ Shareware ] [ No Source ] [ D3 | D4 | D5 | C3 | C4 | C5 ] | ||
SLockPK uses the power of public key encryption to protect your software. Recognized by experts as the only secure way to protect software, public key crypto provides a level of security higher than hardware dongles, but using only software. Features:
Added: 17-05-1998/7-05-2001 | Version: 2.02c | Downloads: 1812/1783/5
|
[ md5_nreg.zip ] [ 53,733 bytes ] | [ Freeware ] [ No Source ] [ D2 | D3 | D4 | C3 ] | ||
TMD5 produces cryptographically secure hasheswhich comply with the RFC1321 standard.Hashes can be used to securely store passwords,sign files or text, or produce checksums. Changingeven one bit of the input changes the hashentirely in a way that can Source: Purchase/Registration Added: 14-06-1998/15-11-1998 | Version: 1.11a | Downloads: 4254/4254/3
|
[ rc6_nreg.zip ] [ 194,910 bytes ] | [ Freeware ] [ No Source ] [ D2 | D3 | D4 | C3 ] | ||
aecRC6 implements the RC6 algorithm, and offers exceptional performance. RC6 is the AES entry from Ron Rivest (of RSA fame), and is an extension of the successful RC5 algorithm.Features: High performance; ECB, CBC, CFB and OFB modes of operation; Hig Full source included (commercial version), 2 years support (commercial registration) Added: 11-10-1998 | Version: 1.11 | Downloads: 1915/1915/1
|
[ twofnreg.zip ] [ 692,568 bytes ] | [ Shareware ] [ No Source ] [ D2 | D3 | D4 | C3 ] | ||
TSM Inc. provides high quality cryptographicsolutions aimed at professional developers and tohobbyists alike.aecTwofish implements the Twofish algorithm - the successor to the famous Blowfish algorithm. Twofish offers better performance and equal security to Blowfish, and is set to become the algorithm of choice for the next decade.Features:- High performance- ECB, CBC, CFB and OFB modes of operation- High level encryption primitives to encrypt- Files- Strings- Blocks- Buffers- Streams- automatic base64 encoding (e.g. fortransmission over email)- CBC-MACs- Full source included (commercial version)- 2 years support (commercial registration)- Automatic updates (commercial registration) Freeware version available on request Added: 3-01-1999 | Version: 1.0 | Downloads: 1550/1550/0
|
© 1995-2006 Robert M. Czerwinski ( The Delphi Super Page a.k.a. DSP ). All rights reserved. |